Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
37s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
13/07/2023, 01:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://auspost.suports.cc
Resource
win10-20230703-en
General
-
Target
http://auspost.suports.cc
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dda40c2cb5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{364F6069-211F-11EE-B102-7A85E0E174DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "180416207" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31044908" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "180416207" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31044908" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31044908" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "181509741" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31044908" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0409b0c2cb5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dadb3f7dcfb5ec4ead74ad76a77486fb000000000200000000001066000000010000200000003a896a9e3a68f441a6117241b1a2fc7cccdb1ebe89989ca1e23c4d258e682d93000000000e8000000002000020000000711bde3e1449a5c4bd48b4d1e6dbd4492249c589acd6bc75f4fd1d75fc38978b2000000018c6effdd41703dfe65685e68dfab1ef045c7fbfdc507965ed0c021b38689cd9400000002252ce09a2908266134bb95e19eaa0d8d62bed22fd3dfb5fa68b62cd2308752442490ca2bec1f2deadea9232c740366be4782f5f912fc0a96935640f96abfa64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "181509741" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dadb3f7dcfb5ec4ead74ad76a77486fb000000000200000000001066000000010000200000002bc4fc7d6d02c0bf757652f7bf9924ae03d683cfd06e8ddd416ea7a66fb58502000000000e80000000020000200000007252161de9dd4b291a2415a70f937851619050912387dd267dbb6b047c892b112000000093b927e34741da7fd773b78beb02bd0e2baaf40c6fb66a64a258d8422cd29b70400000008140a6968f4530fca3cabbaad0b7dadeb430e72f5cf21279cf6a11b63cce70edd94068996efc28a5d1d0c0e9dbb1f421137113903dca34aa251ec1db3d4a5027 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4652 iexplore.exe 4652 iexplore.exe 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE 4956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4652 wrote to memory of 4956 4652 iexplore.exe 70 PID 4652 wrote to memory of 4956 4652 iexplore.exe 70 PID 4652 wrote to memory of 4956 4652 iexplore.exe 70
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://auspost.suports.cc1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4652 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
Filesize
503B
MD56978e30aa97f4580d5f285b3007c01d4
SHA156c7944f2b304c3540c966a62cad3590cb2a569c
SHA2566b34e9184006d08a3260a09e52575072006ec9bdcd91f659ef4e07b5fea2c016
SHA512d947d1b32f48652b89e6074b2030de807febe5bc9fba576f068f8f8fdbd68cdb646ba2b0f3ed45e3a6110de7ad9954d5f07678e2415829af05b5ed98ddd61ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5f4b63c1dc3fe21d846d0bf01d30aaed9
SHA1b9e83a3239553f82a1ca874d2b681f472539a7f7
SHA256da3ab00955cbad87a58339f56f6625c713632b4982e31f7c9a06c4ae1107ff33
SHA512b70ba24567e6802afee4778ffe0a29d45daac6a6caec467ee67bd22547064e7909b1ded078636c12d26a2005190a085acad3f780ab4b0548e012c1af2ada7b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5d1e23ebfc4972d0e7ad341808724f8d6
SHA11a293ca608ad93d1a0c17628e838b3d443907444
SHA2562702fdb69b6e96fb2be7e5daaf683f132320692abd8b2ebaafe24dffa1131740
SHA5121a7b39ea5942b68b21ba65110b5d3cd155aa65cb6f2f4dff212a01c73f3b593d2b8d2bc072edc2deffdd0e1f1060de1fa33b31c841aebdc2c6a89a143afcb3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\20E42644893C3044B7D8DB72DC3AE88C
Filesize548B
MD5f90832c7e6492908ee56d467481518e7
SHA187cbdee894b2373d179b2e6dbb7068c377525ea1
SHA25629f583d1b70d0929abfa163bc82be1ebdba44ae6cdd333810d0d59692ce1a060
SHA512df465c9f9f3ec0c970f2a691efc2bbbd2be250b1636ce8fbee57dc7aedd47ca83a9606910a6cedadd27ec0acda6959bc18fde3054922c470a22410e1cc56db18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD58e611bb111bf7dc44c8790a94a48b250
SHA19349e86223ca0ecc435c384db0c7ca08e1433c1d
SHA25697ec0880080a9e04b79b7dc0f89de2aab292eb100cd9558ced3eb2d66c078a06
SHA512ce7bae0a4cf31d3efa30ca27cff601c4c14a6280aeda2f3c73b9317ebe51a51da1d500241a8526a40e91be94b8197343fe3a9d56fb5f5df54130eb780d97759f
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d